Archive

Category Archives for "Networking"

IDG Contributor Network: 4 ways to simplify data management

If it seems your IT team has more data to manage than ever before, you’re not mistaken. Just about every enterprise is trying to determine how to manage more data growth without scaling budget or staff as well.451 Research analyst Henry Baltazar emphasized this trend in a recent report, noting, “The increasing relevancy of data management is in parallel with the ongoing growth of the sheer volume of data that enterprises must deal with.” The good news is that there are many approaches IT can take to ease the challenges of data growth. Let's take a look at four steps IT can use to make a big impact.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 4 ways to simplify data management

If it seems your IT team has more data to manage than ever before, you’re not mistaken. Just about every enterprise is trying to determine how to manage more data growth without scaling budget or staff as well.451 Research analyst Henry Baltazar emphasized this trend in a recent report, noting, “The increasing relevancy of data management is in parallel with the ongoing growth of the sheer volume of data that enterprises must deal with.” The good news is that there are many approaches IT can take to ease the challenges of data growth. Let's take a look at four steps IT can use to make a big impact.To read this article in full or to leave a comment, please click here

AfPIF Day Two: Identifying Challenges and Opportunities

AfPIF Day Two Summary 

The second day at the Africa Peering and Interconnection Forum (AfPIF) is dedicated to plenary presentations and discussions between the technical community, private sector, and government representatives.

The discussions aim to foster understanding of the landscape the various players operate in, the challenges faced, opportunities and ways to create synergies that guarantee increased connectivity, and exchange of content within the region.

The first session of the day was the formal opening ceremony, with Yves Miezan Ezo, representative of the Conseiller Technique du Ministre de la Communicatiln, de l’Economie Numerique et de la Poste de la république de Cote d’Ivoire, Caliste Claude M’Bayia, representative of l’ARTCI, and Moctar Yadaly, head of Infrastructure and Energy at the African Union Commission (AUC).

In his speech, Dawit Bekele, Head of the Internet Society Africa Bureau, welcomed participants to the 8th AfPIF session, noting that great strides have been made in Africa’s technology landscape, and it will get better.

The first AfPIF session was held in 2010 by the Internet Society out of the realization that too much African Internet traffic was exchanged outside the continent, and the region could save costs by exchanging the content locally.

Bekele noted Continue reading

This Linux tool could improve the security of IoT devices

The first rule of building a secure and feature-rich ecosystem is software management — push and pull software updates and software discovery through an app store mechanism from a trusted source.In the go-to-market IoT race, though, that often doesn’t happen. Many Internet of Things (IoT) product developers have ignored the traumatic early history of Microsoft Windows, Android and web platforms, and expoits of IoT devices — because software updates have not been designed in — are regularly reported.+ Also on Network World: How to improve IoT security + Those earlier platforms have been hardened, updates have been automated, and the app discovery and installation have been made trustworthy. IoT developers need to follow their lead. To read this article in full or to leave a comment, please click here

This Linux tool could improve the security of IoT devices

The first rule of building a secure and feature-rich ecosystem is software management — push and pull software updates and software discovery through an app store mechanism from a trusted source.In the go-to-market IoT race, though, that often doesn’t happen. Many Internet of Things (IoT) product developers have ignored the traumatic early history of Microsoft Windows, Android and web platforms, and expoits of IoT devices — because software updates have not been designed in — are regularly reported.+ Also on Network World: How to improve IoT security + Those earlier platforms have been hardened, updates have been automated, and the app discovery and installation have been made trustworthy. IoT developers need to follow their lead. To read this article in full or to leave a comment, please click here

35% off Pulse Solo Dimmable LED Light with Dual Channel Bluetooth Speakers – Deal Alert

Pulse Solo is the world's first LED light with dual speakers in one bulb. Pulse Solo combines the energy efficiency of a dimmable LED light with the high-quality audio of JBL Bluetooth speakers. Setup is easy, twist the Pulse Solo into any standard light socket, and adjust both lighting and sound from any Bluetooth enabled iOS or Android device. Experience the soaring highs and the rich stereo sound of JBL combined with warm, dimmable lighting, without the fuss of speaker wires, power cords, or an independent remote control. The intuitive iOS and Android App offers seamless control of both light and sound while listening to your favorite streamed music or media, offering you the ability to customize your light and music to suit any mood. The Pulse Solo typically lists on Amazon for $59.99, but is currently discounted 35% to $38.93.   See this deal on Amazon .To read this article in full or to leave a comment, please click here

57% off Rockbirds 6-Pack LED Mini Super Bright 3 Mode Tactical Flashlights – Deal Alert

This mini LED tactical flashlight has 3 modes, an adjustable/zoomable beam, and is both rugged as well as water resistant. Its bright, long-lasting light operates on just a single AA battery. The list price on a pack of 6 has been reduced 57% to just $19.99, so for just $3.33/torch you'll have a light tucked away in every room, every car, every backpack, or anywhere else this might come in handy. The flashlight averages 4.5 out of 5 stars from over 1,200 reviewers on Amazon (see recent reviews here). See this deal now.To read this article in full or to leave a comment, please click here

53% off Rockbirds 6-Pack LED Mini Super Bright 3 Mode Tactical Flashlights – Deal Alert

This mini LED tactical flashlight has 3 modes, an adjustable/zoomable beam, and is both rugged as well as water resistant. Its bright, long-lasting light operates on just a single AA battery. The list price on a pack of 6 has been reduced 53% to just $21.99, so for just $3.67/torch you'll have a light tucked away in every room, every car, every backpack, or anywhere else this might come in handy. The flashlight averages 4.5 out of 5 stars from over 1,200 reviewers on Amazon (see recent reviews here). See this deal now.To read this article in full or to leave a comment, please click here

Half a dozen clever Linux command line tricks

Working on the Linux command can be a lot of fun, but it can be even more fun when you use commands that take less work on your part or display information in interesting and useful ways. In today’s post, we’re going to look at half a dozen commands that might make your time on the command line more profitable.watch The watch command will repeatedly run whatever command you give it and show you the output. By default, it runs the command every two seconds. Each successive running of the command overwrites what it displayed on the previous run, so you're always looking at the latest data.You might use it when you’re waiting for someone to log in. In this case, you would use the command “watch who” or maybe “watch -n 15 who” to have the command run every 15 seconds instead of every two seconds. The date and time will appear in the upper right-hand corner of your terminal window.To read this article in full or to leave a comment, please click here

Unique RD per PE per VRF in MPLS

Unique RD per PE per VRF is a deployment option in MPLS Layer 3 VPN.   In this post I will explain the different RD (Route Distinguisher) assignment options and at the end of the post, you will understand why you should assign unique RD per PE per VRF.   Why RD (Route Distinguisher) is […]

The post Unique RD per PE per VRF in MPLS appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

The Complexity Of Choice

Russ White had an interesting post this week about the illusion of choices and how herd mentality is driving everything from cell phones to network engineering and design. I understand where Russ is coming from with his points, but I also think that Russ has some underlying assumptions in his article that ignore some of the complexity that we don’t always get to see in the world. Especially when it comes to the herd.

Collapse Into Now

Russ talks about needing to get a new mobile phone. He talks about how there are only really two choices left in the marketplace and how he really doesn’t want either of them. While I applaud Russ and his decision to stand up for his principals, there are more than two choices. He could easily purchase a used Windows mobile phone from eBay. He could choose to run a Palm Tree 650 or a Motorola RAZR from 2005. He could even choose not to carry a phone.

You’re probably saying, “That’s not a fair comparison. He needs feature X on his phone, so he can’t use phone Y.”

And you would be right! So right, in fact, that you’ve already missed one Continue reading

DPRIVE experimental service debuts @ IETF 99

TLS badgeThe IETF is not only a place to discuss the development of Internet protocols, but also offers a place for developers and operators to ‘eat their own dog food’ on the meeting network. And given that the IETF DPRIVE Working Group has published some RFC specifications over the past year, the most recent IETF 99 in Prague provided a timely opportunity to run an experimental DNS-over-TLS service.

DNS queries and responses are currently transmitted over the Internet entirely in the clear, and whilst DNSSEC is able to authenticate a response from a DNS server, it does not actually encrypt the transmitted information. The aim of DPRIVE is therefore to add mechanisms to provide confidentiality to DNS transactions and address concerns about pervasive monitoring using TLS or DTLS to encrypt queries and responses between DNS clients and servers.

Some information about how the experimental DNS-over-TLS service was set-up on the IETF network can be found on the IETF99 Experiments page, but the DNS Privacy Project offers a list of experimental servers supporting both IPv4 and IPv6 if you want to try this out yourself. You also can check out their up status.

The post DPRIVE experimental service debuts @ IETF 99 appeared first on Internet Society.